Which of the following should a company deploy to prevent the execution of some types of malicious code?
A.
Least privilege accounts
B.
Host-based firewalls
C.
Intrusion Detection systems
D.
Application white listing
Which of the following should a company deploy to prevent the execution of some types of malicious code?
Which of the following should a company deploy to prevent the execution of some types of malicious code?
A.
Least privilege accounts
B.
Host-based firewalls
C.
Intrusion Detection systems
D.
Application white listing